Wednesday, July 28, 2010

Delhi Police Special Cell Did An Excellent Job In Arresting Cyber Criminal by Cyberforensics

Recently the Anoushka Shankar's (daughter of the legendary music maestro Pandit Ravi Shankar) email hacked into by an offender who took control of some very private photographs stored in the inbox of the email.

Pandit Ravi Shankar has made a complaint to Union Home Ministry that his daughter is blackmailed and threatened via email by some unknown person. Later the complaint was referred to the Delhi Police and the investigation of the case was taken up by Inspector Pawan Kumar under the supervision of ACP Sanjeev Yadav elite Special Cell of Delhi Police. The unknown accused person was allegedly blackmailed and threatened Anoushka via emails that he would make some of her photographs public found in her email inbox, if his demand of $ 100,000 is not paid by her.

It caused great tension to the father daughter duo who are internationally recognized musicians.

The special cell cops traced the internet protocol address (IP address) from which the Emails were sent. An IP address or “Internet Protocol” address is the unique number assigned to every device such as a computer on an internet network so that data can be routed to and from that device and no other. It is much similar to a postal mailing address that identifies the physical location of your post office and allows the mail carrier to know where to deliver the mail, a device’s IP address is what allows the internet to know where to send the data destined for the particular computer. It’s not an easy task to trace the physical location of the computer to which an internet IP address has been assigned.

The IP address can be tracked from the header of the Email IDs. There are various IP address locator available like http://www.whois-search.com from where one can get information about the ISP address to which the particular IP address belongs. Some additional information may be available that indicates the general area that an IP address might reside, i.e. the location of the country or city, if ever, but nothing more specific than that. Here the help of the ISP is required to pinpoint the location and identity of the user. The ISP that allots the IP address to particular computer knows where the user lives. But the ISP’s would not provide the information to the general public due to the strict privacy policy which they adhere to. Here the role of law enforcement machinery comes into picture. The Police and the courts can, with appropriate cause, direct the ISP that the requisite information with respect to the IP addresses be provided. The Section 91 of Code of Criminal Procedure, 1973 and Section 69 of the Information Technology Act, 2000 makes provision to this effect.

The extortive emails sent by the offender were found to be sent mostly from Gmail Account. However, the Gmail blocks the IP address of the sender and it is not visible to the recipient of the email. However, one email was found to be from other email service provider and it was found that it had been sent from India; rest of the emails were found to be from Dubai, elsewhere in the UAE, and the USA. The police tracked down one of the IP address to a residential address located at MUMBAI and nabbed the accused person, whose name came to be known as Junaid Jameel Ahmed Khan who confessed to his crime. The cops seized the hard disk of the computer from which the alleged emails were sent, prepared the mirror image of the same and the hard disk was sent to the Forensic Science Laboratory, Hyderabad for further analysis. The cops also seized the passport of the offender through which it was found that the offender was at Dubai on the same date when the extortive emails from Dubai were received by Anoushka, which clearly corroborates the offence committed by the offender.

The police have seized and preserved the crucial digital evidences and other documentary evidences which would prove the guilt of the accused person. Cyber technology is an extremely complicated field and the internet is being increasingly used as a place to commit crimes using personal computers, as well as network-based computers. It clearly shows that the Special Cell Cops know their job; they not only understand the criminal mindset but also Computers and networks, how they work, and how to track down information on them and know the basics of gathering evidence and bringing offenders to justice.

The Special Cell cops registered the case under Section 386 Indian Penal Code which deals with offence of extortion. The maximum punishment for such a crime, if proven guilty, is 10 years’ imprisonment. The offence is cognizable and non bailable. The accused hacked into the email of the Anoushka, however the police at the preliminary investigation stage did not invoked Section 66 IT Act, because the modus operandi of the offender was not known as how he took control of the private photographs of Anoushka, which during investigation and seizure of the computer become apparent that the same has been copied into his computer by hacking the email id of Anoushka. Now Section 66 IT Act has been added as the same is attracted to the offence. The material evidence seized by the cops proves the involvement of the offender as the IP address has been traced to his residence. Further, the examination and analysis of the seized hard disk of the computer of offender at the forensic laboratory would prove that the emails have been hacked into and photographed copied by the offender from the inbox of the email. If it is further revealed by the analysis of the hard disk that the photographs (read obscene or nude) found in the possession of the offender, have been transmitted by him electronically, say some of his friends, the same would amount to publication in electronic form which would be squarely covered and punishable under Section 67 of the IT Act, 2000 as well.
The success of Delhi Police definitely provide some deterrence to the cyber criminals that they are not scot free. At the same time the internet users should learn some lessons and be more cautious of the security and fire walls of their e-mails and websites.